Webinar Confirmation


Thank you, you are now registered for this webinar! You will receive an email with your confirmation. Please make sure you also check your spam mail in case it ends up in there. W
e look forward to seeing you! Also take a look at our list of on-demand webinars, and register for the ones that interest you.

 

Welcome to SecurityBoulevard.com Webinars On-Demand! The On-Demand Library hosts recordings of all live webinars and are always available for viewing at your convenience. Registration is free. Enjoy!

How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case Study

How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case Study

Managing access permissions in the public cloud can be a very complex process. In fact, by 2023, 75% of cloud security failures will result from the inadequate management of identities, access and privileges, according to Gartner ... Read More
December 3, 2020
Ermetic
Simple Alternative to Kubernetes: Container Orchestration with Nomad

Simple Alternative to Kubernetes: Container Orchestration with Nomad

Nomad is a workload orchestration tool for deploying and managing applications. Nomad’s simplicity uniquely enables small, lean DevOps teams to adopt, operate, and scale their container deployment with little overhead. It is also flexible and can run either containerized or non-containerized workloads, such as java and windows applications ... Read More
December 2, 2020
HashiCorp
DevSecOps: Best Practices for Enterprises

DevSecOps: Best Practices for Enterprises

The benefits of DevSecOps make a compelling case for its adoption. However, for many enterprise organizations, progressing from adoption to scale continues to be a challenge — which in turn, impacts their chances of success ... Read More
December 2, 2020
WhiteSource
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Data Breaches

Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020’s Worst Data Breaches

This year has been full of surprises — and cloud security data breaches have been no exception. From hotel chains to dating apps and video conferencing, misconfigurations and mistakes have left many organizations with exposed data. Knowing how data breaches happen and how to prevent them from happening is key ... Read More
December 1, 2020
Sonrai Security
Protecting Mobile Apps and APIs from the Inside Out

Protecting Mobile Apps and APIs from the Inside Out

From mobile banking to telemedicine to ecommerce, consumers are relying on web and mobile apps more than ever before. But as organizations become even more dependent on the revenue these apps generate, most still aren’t doing enough to protect applications against attacks that can compromise data or lead to fraud ... Read More
November 19, 2020
Numerify
Zero Trust Network Security for Containers and Kubernetes

Zero Trust Network Security for Containers and Kubernetes

As containers and Kubernetes are adopted in production, DevOps teams need to go beyond image scanning. Use cases such as runtime security, network visibility and segmentation, incident response and compliance become priorities as your Kubernetes security framework matures. Implementing Zero Trust network security is a must to prevent lateral movement, ... Read More
November 19, 2020
Sysdig
Shifting Compliance and Security Left - Into the Hands of the Developers

Shifting Compliance and Security Left – Into the Hands of the Developers

The software world is alive with talk of shifting left, but what does it really mean? Theoretically, it means shifting responsibility for security and compliance to developers. In practice, it largely means enriching CI/CD processes to detect problematic licenses and vulnerabilities before they reach the main branch or production ... Read More
November 18, 2020
WhiteSource
Integrating Data Security into the DevSecOps Toolchain

Integrating Data Security into the DevSecOps Toolchain

Today, DevOps teams who aren’t security experts are often left to build secure applications and protect the sensitive data that their applications handle without the required tools, APIs, or guidance from information security professionals. Integrating security into DevOps to create DevSecOps requires a transformation of legacy data security infrastructure to ... Read More
November 17, 2020
Fortanix
Pentest as a Service Impact 2020

Pentest as a Service Impact 2020

In this webinar we will explore the findings from the recent PtaaS Impact Report: 2020, which aims to unravel the benefits and challenges of deploying a SaaS-based pentesting model in a modern software development environment ... Read More
November 16, 2020
Cobalt
Static Analysis of Scala Applications

Static Analysis of Scala Applications

Scala is gaining a lot of popularity in the web sphere, owing to its elegant design and a very versatile design that allows a fusion of object oriented design patterns along with a functional programming style. Scala is compact and yields better performance that its counterparts. In this webinar, we ... Read More
November 11, 2020
ShiftLeft